CTP - Crossword The Puzzle!

12345678910111213141516171819
Across
  1. 2. Redundant copy kept for recovery
  2. 4. Deceptive lure to steal credentials
  3. 6. Converts readable data into cipher text
  4. 8. Code that leverages a flaw to gain access
  5. 10. Unplanned event that disrupts normal operations
  6. 12. Malicious software that harms systems
  7. 13. Malware that encrypts files for payment
  8. 16. Scientific analysis of evidence after an event
  9. 18. Weakness that an attacker can exploit
  10. 19. Highest-privileged user role
Down
  1. 1. Process that verifies a user’s claimed identity
  2. 3. Network of hijacked machines under one controller
  3. 5. Network barrier that filters unwanted traffic
  4. 7. Malware that secretly harvests user data
  5. 9. Malicious program disguised as legitimate
  6. 11. On-demand remote computing environment
  7. 14. Login method with two-plus factors (abbr.)
  8. 15. Proof of identity used to log in
  9. 17. Traffic-filtering barrier between networks
  10. 18. Encrypted tunnel over public networks (abbr.)